z-logo
open-access-imgOpen Access
Spoofing – An Attack On Node Identity And Its Remedial Research
Author(s) -
Abhishek Kumar,
M Ganesh Raja
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.f1266.0986s319
Subject(s) - spoofing attack , computer security , computer science , eavesdropping , computer network , denial of service attack , vulnerability (computing) , node (physics) , identity theft , network security , engineering , world wide web , the internet , structural engineering
Network is the prime demand of today’s outreaching development in every sector. Starting from a small institute to big sectors like Industry, Organization, Defense, Ministry and Medicine all are dependent on network to maintain their data transmission efficiently. It provides the great ease of operation and information sharing. As we know with greater ease, much greater threat is handy. With the network also a big threat is associated i.e. network attacks. There are some major attacks which can violate and damage the whole network system and its integrity. Wireless attacks are very common and an intruder with vast knowledge of network administration and modification can easily find the loopholes in the security systems. There are different attacks like Denial of Services (DoS), Sniffer, Password Based, Spoofing, Eavesdropping etc. but the most dangerous of all is spoofing. Spoofing is an attack type in that the intruder impersonates as original identity and use their identity to achieve the intrusion goal. The attack is so severe because the user, even after seeing the intruder cannot identify it as the external body and take immediate action. The intruder enters the network and steals all the information as a legitimate user and damages the integrity of network. We propose here to find the intruder by using the energy consumption by nodes using the dead, asleep and active nodes. We can localize the location of intruders in the network using this technique. We use Received Signal Strength (RSS) to see the energy consumption of each node as the fluctuation of intruder node will be different from genuine nodes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here